Malware Analysis for Binary Security
Tools and techniques for analyzing, reverse-engineering, and understanding malicious software. Task: Binary Security
Explore 60 curated tools and resources
RELATED TASKS
LATEST ADDITIONS
A command-line program for finding secrets and sensitive information in textual data and Git history.
A deserialization payload generator for .NET formatters
A collection of Yara rules for identifying malicious PEs with unique or suspicious PDB paths.
Copy executables with execute, but no read permission on Unix systems.
YaraHunter scans container images, running Docker containers, and filesystems to find indicators of malware.
Generates a YARA rule to match basic blocks of the current function in IDA Pro
A tool that scans a corpus of malware and builds a YARA rule to detect similar code sections.
A collection of resources for beginners to learn assembly language.
A collection of Android Fakebank and Tizi samples for analyzing spyware on Android devices.
angr is a Python 3 library for binary analysis with various capabilities like symbolic execution and decompilation.
A Yara ruleset for detecting PHP shells and other webserver malware.
Ropper is a tool for analyzing binary files and searching for gadgets to build rop chains for different architectures.
Online Java decompiler tool with support for modern Java features.
PINNED
InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
System Two Security
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.
Aikido Security
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.
Permiso
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.